University of Hertfordshire

By the same authors

Mobile devices: A phisher's paradise

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Standard

Mobile devices : A phisher's paradise. / Virvilis, Nikos; Tsalis, Nikolaos; Mylonas, Alexios; Gritzalis, Dimitris.

SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Part of ICETE 2014 - 11th International Joint Conference on e-Business and Telecommunications. ed. / Mohammad S. Obaidat; Andreas Holzinger; Pierangela Samarati. SciTePress, 2014. p. 79-87 (SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Part of ICETE 2014 - 11th International Joint Conference on e-Business and Telecommunications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Virvilis, N, Tsalis, N, Mylonas, A & Gritzalis, D 2014, Mobile devices: A phisher's paradise. in MS Obaidat, A Holzinger & P Samarati (eds), SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Part of ICETE 2014 - 11th International Joint Conference on e-Business and Telecommunications. SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Part of ICETE 2014 - 11th International Joint Conference on e-Business and Telecommunications, SciTePress, pp. 79-87, 11th International Conference on Security and Cryptography, SECRYPT 2014 - Part of 11th International Joint Conference on e-Business and Telecommunications, ICETE 2014, Vienna, Austria, 28/08/14. https://doi.org/10.5220/0005045000790087

APA

Virvilis, N., Tsalis, N., Mylonas, A., & Gritzalis, D. (2014). Mobile devices: A phisher's paradise. In M. S. Obaidat, A. Holzinger, & P. Samarati (Eds.), SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Part of ICETE 2014 - 11th International Joint Conference on e-Business and Telecommunications (pp. 79-87). (SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Part of ICETE 2014 - 11th International Joint Conference on e-Business and Telecommunications). SciTePress. https://doi.org/10.5220/0005045000790087

Vancouver

Virvilis N, Tsalis N, Mylonas A, Gritzalis D. Mobile devices: A phisher's paradise. In Obaidat MS, Holzinger A, Samarati P, editors, SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Part of ICETE 2014 - 11th International Joint Conference on e-Business and Telecommunications. SciTePress. 2014. p. 79-87. (SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Part of ICETE 2014 - 11th International Joint Conference on e-Business and Telecommunications). https://doi.org/10.5220/0005045000790087

Author

Virvilis, Nikos ; Tsalis, Nikolaos ; Mylonas, Alexios ; Gritzalis, Dimitris. / Mobile devices : A phisher's paradise. SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Part of ICETE 2014 - 11th International Joint Conference on e-Business and Telecommunications. editor / Mohammad S. Obaidat ; Andreas Holzinger ; Pierangela Samarati. SciTePress, 2014. pp. 79-87 (SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Part of ICETE 2014 - 11th International Joint Conference on e-Business and Telecommunications).

Bibtex

@inproceedings{889e2049aab84fc79c041182b0a58164,
title = "Mobile devices: A phisher's paradise",
abstract = "Mobile devices - especially smartphones - have gained widespread adoption in recent years, due to the plethora of features they offer. The use of such devices for web browsing and accessing email services is also getting continuously more popular. The same holds true with other more sensitive online activities, such as online shopping, contactless payments, and web banking. However, the security mechanisms that are available on smartphones and protect their users from threats on the web are not yet mature, as well as their effectiveness is still questionable. As a result, smartphone users face increased risks when performing sensitive online activities with their devices, compared to desktop/laptop users. In this paper, we present an evaluation of the phishing protection mechanisms that are available with the popular web browsers of Android and iOS. Then, we compare the protection they offer against their desktop counterparts, revealing and analyzing the significant gap between the two.",
keywords = "Android, IOS, Mobile, Phishing, Security, Smartphone, Web browser, Windows",
author = "Nikos Virvilis and Nikolaos Tsalis and Alexios Mylonas and Dimitris Gritzalis",
year = "2014",
doi = "10.5220/0005045000790087",
language = "English",
series = "SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Part of ICETE 2014 - 11th International Joint Conference on e-Business and Telecommunications",
publisher = "SciTePress",
pages = "79--87",
editor = "Obaidat, {Mohammad S.} and Andreas Holzinger and Pierangela Samarati",
booktitle = "SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Part of ICETE 2014 - 11th International Joint Conference on e-Business and Telecommunications",
note = "11th International Conference on Security and Cryptography, SECRYPT 2014 - Part of 11th International Joint Conference on e-Business and Telecommunications, ICETE 2014 ; Conference date: 28-08-2014 Through 30-08-2014",

}

RIS

TY - GEN

T1 - Mobile devices

T2 - 11th International Conference on Security and Cryptography, SECRYPT 2014 - Part of 11th International Joint Conference on e-Business and Telecommunications, ICETE 2014

AU - Virvilis, Nikos

AU - Tsalis, Nikolaos

AU - Mylonas, Alexios

AU - Gritzalis, Dimitris

PY - 2014

Y1 - 2014

N2 - Mobile devices - especially smartphones - have gained widespread adoption in recent years, due to the plethora of features they offer. The use of such devices for web browsing and accessing email services is also getting continuously more popular. The same holds true with other more sensitive online activities, such as online shopping, contactless payments, and web banking. However, the security mechanisms that are available on smartphones and protect their users from threats on the web are not yet mature, as well as their effectiveness is still questionable. As a result, smartphone users face increased risks when performing sensitive online activities with their devices, compared to desktop/laptop users. In this paper, we present an evaluation of the phishing protection mechanisms that are available with the popular web browsers of Android and iOS. Then, we compare the protection they offer against their desktop counterparts, revealing and analyzing the significant gap between the two.

AB - Mobile devices - especially smartphones - have gained widespread adoption in recent years, due to the plethora of features they offer. The use of such devices for web browsing and accessing email services is also getting continuously more popular. The same holds true with other more sensitive online activities, such as online shopping, contactless payments, and web banking. However, the security mechanisms that are available on smartphones and protect their users from threats on the web are not yet mature, as well as their effectiveness is still questionable. As a result, smartphone users face increased risks when performing sensitive online activities with their devices, compared to desktop/laptop users. In this paper, we present an evaluation of the phishing protection mechanisms that are available with the popular web browsers of Android and iOS. Then, we compare the protection they offer against their desktop counterparts, revealing and analyzing the significant gap between the two.

KW - Android

KW - IOS

KW - Mobile

KW - Phishing

KW - Security

KW - Smartphone

KW - Web browser

KW - Windows

UR - http://www.scopus.com/inward/record.url?scp=84908889447&partnerID=8YFLogxK

U2 - 10.5220/0005045000790087

DO - 10.5220/0005045000790087

M3 - Conference contribution

AN - SCOPUS:84908889447

T3 - SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Part of ICETE 2014 - 11th International Joint Conference on e-Business and Telecommunications

SP - 79

EP - 87

BT - SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Part of ICETE 2014 - 11th International Joint Conference on e-Business and Telecommunications

A2 - Obaidat, Mohammad S.

A2 - Holzinger, Andreas

A2 - Samarati, Pierangela

PB - SciTePress

Y2 - 28 August 2014 through 30 August 2014

ER -